IT Questions and Answers :)

Thursday, April 19, 2018

In Windows, What does the "ping -a" command allow you to find out about an IP address?

In Windows, What does the "ping -a" command allow you to find out about an IP address?

  • Router address of the host
  • IP address of the host
  • Resolve the host name
  • Default gateway of the host 

 
In Windows, What does the "ping -a" command allow you to find out about an IP address?

EXPLANATION

In many cases, the "ping -a" command will return the host name if you know the IP address.
This is a good first step when attempting to identify the host.

Share:

Wednesday, April 18, 2018

A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

  • Side saddle
  • Hosted
  • Bare metal
  • Type 2 

 
A hypervisor that runs directly on top of hardware (as opposed to on an OS) is known as:

EXPLANATION

A bare-metal (also known as native or type-1) hypervisor runs directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called bare-metal hypervisors.
A guest operating system runs as a process on the host.
Share:

Tuesday, April 17, 2018

Which benefit of being joined to a domain is not natively shared by Apple Macintosh computers?

Which benefit of being joined to a domain is not natively shared by Apple Macintosh computers?

  • Group Policy
  • Password Policy Enforcement
  • Single Sign-On
  • Windows Home Folders 

 
Which benefit of being joined to a domain is not natively shared by Apple Macintosh computers?

EXPLANATION


A domain-joined Mac workstation allows users to enjoy the following privileges:
  • Kerberos authentication and delegation, including Single Sign-On to local, AD, and Open Directory resources
  • AD password policy enforcement
  • Support for AD user and group accounts
  • Windows home folders
Of course, Mac computers do not have a Windows Registry and so therefore cannot be managed natively by Group Policy (the password policy issue previously mentioned is a notable exception).

SOURCE

https://4sysops.com/archives/how-to-join-a-mac-os-x-computer-to-active-directory/
Share:

Friday, April 13, 2018

In Linux and Unix systems, what directory is most likely to contain system configuration data?

In Linux and Unix systems, what directory is most likely to contain system configuration data?

  • /boot/
  • ~/.config
  • /usr/share/doc
  • /etc/ 
 
In Linux and Unix systems, what directory is most likely to contain system configuration data?

EXPLANATION

As a rule, system configuration data should be kept in /etc/ http://tldp.org/LDP/Linux-Filesystem-Hierarchy/Linux-Filesystem-Hierarchy.pdf This can be quite useful knowledge when figuring out backup and recovery plans!
 
Share:

Thursday, April 12, 2018

You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

  • GRE not enabled or blocked on the firewall.
  • Port forward of UDP 1723 missing.
  • No static routes configured on the firewall.
  • Port forward of UDP 500 missing.
You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

EXPLANATION

GRE is an encapsulation protocol required by some PPTP VPN connections, notably Microsoft's implementation. Some cheaper and consumer level firewall/routers do not support or have an option for GRE, or if it does it might be disabled or blocked.
UDP 500 is specific to IPSEC.
Along with the citation, also see...
http://whp-aus1.cold.extweb.hp.com/pub/networking/software/ProCurve-SR-dl-GRE-Config-Guide.pdfhttp://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/118361-technote-gre-0....
https://en.wikipedia.org/wiki/Generic_Routing_Encapsulation

SOURCE

https://blogs.technet.microsoft.com/rrasblog/2009/08/12/troubleshooting-common-vpn-related-errors/
Share:

Convert 101101 from binary to decimal!

Convert 101101 from binary to decimal!

  • 44
  • 61
  • 45
  • 41 

Convert 101101 from binary to decimal!

EXPLANATION

Each 1 represents a power of 2, so this is equivalent to 2^5 + 2^3 + 2^2 + 2^0, or 32 + 8 + 4 + 1 = 45.

1 x 1 = 1
0 x 2 = 0
1 x 4 = 4
1 x 8 = 8
0 x 16 = 0
1 x 32 = 32

1 + 4 + 8 + 32 = 45
Share:

Wednesday, April 11, 2018

What's a stealthy and continuous computer hacking process often targeted at a specific entity?

What's a stealthy and continuous computer hacking process often targeted at a specific entity?

  • Shadow ninja attack
  • Advanced persistent threat
  • Advanced malware attack
  • Silent and deadly attack 

 
What's a stealthy and continuous computer hacking process often targeted at a specific entity?

EXPLANATION

An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection, and harvest valuable information over the long term. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. APTs require a high degree of covertness over an extended period of time.
Share:

Popular Posts